CIC-BCCC-NRC TabularIoTAttack-2024
The CIC-BCCC-NRC TabularIoTAttack-2024 dataset is a comprehensive collection of IoT network traffic data generated as part of an advanced effort to create a reliable source for training and testing AI-powered IoT cybersecurity models. This dataset is designed to address modern challenges in detecting and identifying IoT-specific cyberattacks, offering a rich and diverse set of labeled data that reflects realistic IoT network behaviours.
Dataset overview
The CIC-BCCC-NRC TabularIoTAttack-2024 dataset includes a variety of network traffic data, augmented to simulate IoT environments with high fidelity. It was generated using both real IoT devices and simulated attack scenarios, which were conducted in a controlled lab environment including nine common available datasets:
| Year |
Original dataset |
Augmented name |
| 2019 |
IoT Network Intrusion Dataset |
CIC-BCCC-NRC IoT-HCRL-2019 |
| 2020 |
MQTT-IoT-IDS-2020 |
CIC-BCCC-NRC MQTTIoT-IDS-2020 |
| 2021 |
TON IoT 2021 |
CIC-BCCC-NRC TONIoT-2021 |
| 2022 |
UQ IoT 2022 |
CIC-BCCC-NRC UQ-IoT-2022 |
| 2022 |
CIC IoT 2022 |
CIC-BCCC-NRC IoT-2022 |
| 2022 |
Edge-IIoTset |
CIC-BCCC-NRC Edge-IIoTset-2022 |
| 2023 |
CIC IoT 2023 |
CIC-BCCC-NRC IoT-2023 |
| 2023 |
ACI IoT Network Traffic Dataset 2023 |
CIC-BCCC-NRC ACI-IoT-2023 |
| 2024 |
CIC IoMT 2024 |
CIC-BCCC-NRC IoMT-2024 |
The dataset extracted a wide array of network characteristics using CICFlowMeter, with each record containing relevant features such as network flows, timestamps, source/destination IPs and attack labels.
Key features
- Network Traffic Data: Collected from IoT devices under both benign and attack conditions.
- Labeled Dataset: Each instance is labeled to denote whether it is normal traffic or malicious, including attack types such as DDoS, ransomware and data exfiltration.
- Tabular Format: The dataset is presented in a tabular format to facilitate its use in machine learning tasks.
- Comprehensive: Contains over 1 million records, with detailed feature extraction using CICFlowMeter.
- Real-World Scenarios: Includes attack scenarios based on real-world IoT vulnerabilities and behaviour patterns.
Data generation methodology
- IoT Device Setup: A range of IoT devices, including cameras, smart lights and sensors, were deployed in different testbed environments from the selected original datasets.
- Network Traffic Capture: Network traffic was captured using the CICFlowMeter tool, which monitors and logs all inbound and outbound communications from these devices.
- Attack Simulation: Various attack scenarios were launched, including botnet-based Distributed Denial of Service (DDoS), ransomware, man-in-the-middle, and privilege escalation attacks in each selected dataset.
- Feature Extraction: Data points were augmented by extracting network flow features such as packet size, duration, byte counts and connection states using CICFlowMeter.
- Tabular Transformation: The raw network data was processed into a tabular format, ensuring compatibility with AI models designed for supervised learning tasks.
- Labeling: Each record was carefully labeled, identifying normal and attack traffic, with specific tags for different attack types from each selected dataset.
Citation
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, “An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic”, Journal of Information and Intelligence, 2024.
Download the dataset